User's Guide

Table Of Contents
take advantage of the detection through the floor and ceiling. If location tracking is needed, the same 3
sensors for each floor plan would be required and the recommended placement is 3 sensors in the
corners of each floor.
Sensor Monitoring
AirDefense allows you to define system profiles that help monitor:
Sensor performance
Sensor security
Sensor policies.
You should set up profiles to assist you in monitoring your system. If thresholds set in the profiles are
exceeded, an alarm is generated for the violation which alerts you of the problem:
Note
Sensor monitoring profiles are described in detail in Chapter 7, Configuration, or in the
Configuration tab (online Help).
Sensor Operation is used to:
Enable Sensor-level options
Configure the Sensor scan pattern
Configure sensor settings for Advanced Spectrum Analysis.
Navigation: Configuration > Operational Management > Sensor Operation
Environment Monitoring is used to configure the thresholds for monitoring. If a threshold value is
exceeded, an alarm is generated. You can also elect to monitor your system for unobserved devices
and generate alarms for missing devices.
Navigation: Configuration > Network Assurance > Environment Monitoring
Performance Profiles is used to create and edit network performance threshold policies for BSSs and
wireless clients on your wireless LAN.
Navigation: Configuration > Network Assurance > Performance Profiles
Security Profile is used to define the security configurations of sanctioned wireless clients on your
wireless LAN.
Navigation: Configuration > Appliance Platform > Security Profiles Configuration > Security &
Compliance > Security Profiles
Wired Network Monitoring is used to monitor the wired network devices in your system and
generate an alarm under certain conditions.
Navigation: Configuration > Security & Compliance > Wired Network Monitoring
Vulnerability Assessment
Using your existing sensor deployment, Vulnerability Assessment scans your wireless network for
vulnerabilities utilizing a hacker's point-of-view. This allows you to:
Identify network security issues before a hacker does
Legacy Content
Sensor Monitoring
Extreme AirDefense User Guide for version 10.5. 1385